|
Colapse all |
Post message
[ECHO_ADV_21$2005] MUltiple Vulnarable In ActiveBuyAndSell 2005-06-24 Dedi securityfocus com,Dwianto securityfocus com (the_day echo or id) ------------------------------------------------------------------------ --- [ECHO_ADV_21$2005] MUltiple Vulnarable In ActiveBuyAndSell ------------------------------------------------------------------------ --- Author: Dedi Dwianto Date: June, 24th 2005 Location: Indonesia, Jakarta Web: http://echo [ more ] [ reply ] Solaris 10 /usr/sbin/traceroute vulnerabilities 2005-06-24 Przemyslaw Frasunek (venglin freebsd lublin pl) (1 replies) /usr/sbin/traceroute from Solaris 10 is vulnerable to buffer overflow in handling -g argument. After supplying 10 -g parameters, return address is overwritten by IP address argument: atari:root:/home/venglin# /usr/sbin/traceroute -g 1 -g 2 -g 3 -g 4 -g 5 -g 6 -g 7 -g 8 -g 9 -g 10 127.0.0.1 tracerou [ more ] [ reply ] Re: Solaris 10 /usr/sbin/traceroute vulnerabilities 2005-06-24 David T. Moraski II (moraski2 Princeton EDU) iDEFENSE Security Advisory 06.23.05: RealNetworks RealPlayer RealText Parsing Heap Overflow Vulnerability 2005-06-24 iDEFENSE Labs (labs-no-reply idefense com) RealNetworks RealPlayer RealText Parsing Heap Overflow Vulnerability iDEFENSE Security Advisory 06.23.05 www.idefense.com/application/poi/display?id=250&type=vulnerabilities June 23, 2005 I. BACKGROUND RealPlayer is an application for playing various media formats, developed by RealNetworks Inc. [ more ] [ reply ] iDEFENSE Security Advisory 06.23.05: Veritas Backup Exec Server Remote Registry Access Vulnerability 2005-06-23 iDEFENSE Labs (labs-no-reply idefense com) Veritas Backup Exec Server Remote Registry Access Vulnerability iDEFENSE Security Advisory 06.23.05 www.idefense.com/application/poi/display?id=269&type=vulnerabilities June 23, 2005 I. BACKGROUND VERITAS Backup Exec is an advanced backup and restore solution for Microsoft Windows server environ [ more ] [ reply ] Veritas Backup Exec Remote Agent NDMLSRVR.DLL DoS Vulnerability: Veritas Backup Exec Remote Agent NDMLSRVR.DLL DoS Vulnerability 2005-06-23 iDEFENSE Labs (labs-no-reply idefense com) Veritas Backup Exec Remote Agent NDMLSRVR.DLL DoS Vulnerability iDEFENSE Security Advisory 06.23.05 www.idefense.com/application/poi/display?id=270&type=vulnerabilities June 23, 2005 I. BACKGROUND VERITAS Backup Exec is an advanced backup and restore solution for Microsoft Windows server environ [ more ] [ reply ] Re: [Full-disclosure] Solaris 10 /usr/sbin/traceroute vulnerabilities 2005-06-24 Przemyslaw Frasunek (venglin freebsd lublin pl) Przemyslaw Frasunek napisa³(a): > Another vulnerability is heap corruption after malformed -s argument: I've forgotten to provide an example: atari:root:/home/venglin# traceroute -s 1.1.1.1. 127.0.0.1 traceroute: 4.0.0.0 is an invalid IPv4 source address Segmentation fault (core dumped) -- * Fid [ more ] [ reply ] iDEFENSE Security Advisory 06.23.05: Veritas Backup Exec Agent Error Status Remote DoS Vulnerability 2005-06-23 iDEFENSE Labs (labs-no-reply idefense com) Veritas Backup Exec Agent Error Status Remote DoS Vulnerability iDEFENSE Security Advisory 06.23.05 www.idefense.com/application/poi/display?id=271&type=vulnerabilities June 23, 2005 I. BACKGROUND VERITAS Backup Exec is an advanced backup and restore solution for Microsoft Windows server enviro [ more ] [ reply ] iDEFENSE Security Advisory 06.23.05: Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability 2005-06-23 iDEFENSE Labs (labs-no-reply idefense com) Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability iDEFENSE Security Advisory 06.23.05 www.idefense.com/application/poi/display?id=272&type=vulnerabilities June 23, 2005 I. BACKGROUND VERITAS Backup Exec is an advanced backup and restore solution for Microsoft Windows se [ more ] [ reply ] [OpenPKG-SA-2005.011] OpenPKG Security Advisory (shtool) 2005-06-23 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] eEye Advisory - EEYEB-200505 - RealPlayer AVI Processing Overflow 2005-06-23 Advisories eeye com RealPlayer vidplin.dll AVI Processing Heap Overflow Release Date: June 23, 2005 Date Reported: May 4, 2005 Patch Development Time (In Days): 36 Severity: High (Code Execution) Vendor: RealNetworks Systems Affected: For Microsoft Windows RealPlayer 10.5 (6.0.12.1040-1069) RealPlayer 10 RealOne [ more ] [ reply ] [OpenPKG-SA-2005.012] OpenPKG Security Advisory (sudo) 2005-06-23 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] long sendmail timeouts let attacker prevent milter quiesce 2005-06-23 Damian Menscher (menscher uiuc edu) Summary: An attacker that can predict when a milter will need to quiesce input to allow for a reload may hold open an SMTP session for several hours. This will lead to a DoS condition on the mailserver. Background: Sendmail is a popular Mail Transfer Agent (MTA), used in many large sites that requi [ more ] [ reply ] Vulnerability Statements 2005-06-23 Mark Litchfield (mark ngssoftware com) Hi All, Wanted to quickly apologise for being not quite on top of things in terms of releasing my vulnerability statements over the last 4 weeks. In case you have not upgraded your iTunes, would recommend doing so - http://docs.info.apple.com/article.html?artnum=301596 (File format over flow) [ more ] [ reply ] Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC) 2005-06-23 NGSSoftware Insight Security Research (mark ngssoftware com) Mark Litchfield of NGSSoftware has discovered a high risk vulnerability in the in VERITAS Software Backup Exec Web Administration Console (BEWAC) which can allow for remote code execution. Affected Products include - Backup Exec 10.0 for Windows Servers rev. 5484 Backup Exec 9.1 for Windows Serve [ more ] [ reply ] Remote Command Execution Exploit for Cacti <= 0.8.6d 2005-06-22 Alberto Trivero (trivero jumpy it) #!/usr/bin/perl # # Remote Command Execution Exploit for Cacti <= 0.8.6d # # This exploit open a remote shell on the targets that uses Cacti # TARGET HOST MUST BE A GNU/LINUX SERVER, if not: # manual exploiting --> http://www.example.com/cacti/graph_image.php?local_graph_id=[valid_value ]&gr aph_star [ more ] [ reply ] New release of the Auditor Security Collection available at http://www.remote-exploit.org 2005-06-22 Max Moser (max moser gmail com) I am proud to announce the release of the new version of the Auditor Security Collection CD-ROM. We put in a lot of effort to bring it into that final look and feel. It seems to be the best version released ever. Not only because of its completeness, no it seems to be the most stable and bugfree ver [ more ] [ reply ] Weaknesses in WLAN Session Containment 2005-06-23 Joshua Wright (jwright hasborg com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 While evaluating several overlan WLAN IDS products for a Network Computing product review, I had the opportunity to examine different vendor's implementations of WLAN session containment. WLAN session containment is very similar to persistent session s [ more ] [ reply ] [ECHO_ADV_20$2005] Full path disclosure JAF CMS 2005-06-23 the_day echo or id ------------------------------------------------------------------------ --- [ECHO_ADV_20$2005] Full path disclosure JAF CMS ------------------------------------------------------------------------ --- Author: Dedi Dwianto Date: June, 23th 2005 Location: Indonesia, Jakarta Web: http://echo.or.id/adv/ [ more ] [ reply ] [ GLSA 200506-22 ] sudo: Arbitrary command execution 2005-06-23 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Local Root exploit (Fedora Core 4) 2005-06-23 Florian Strankowski (fs) (florian s bildunxxluecke de) (1 replies) Local Root Exploit under Fedora Core 4 (stable) Advisory Florian Strankowski florian.s (at) bildunxxluecke (dot) de [email concealed] www.bildunxxluecke.de/usr/florian/advisory/advisory-05-048.txt Vulnerable System : This vulnerability affects Fedora Core 4.0 (stable) with the kernelversion 2.6.11-1.1369_FC4 #1 Thu Jun 2 22: [ more ] [ reply ] iDEFENSE Security Advisory 06.22.05: IpSwitch WhatsUp Professional 2005 (SP1) SQL Injection Vulnerability 2005-06-22 iDEFENSE Labs (labs-no-reply idefense com) IpSwitch WhatsUp Professional 2005 (SP1) SQL Injection Vulnerability iDEFENSE Security Advisory 06.22.05 www.idefense.com/application/poi/display?id=268&type=vulnerabilities June 22, 2005 I. BACKGROUND WhatsUp Professional 2005 SP1 is a network management solution for small and mid sized organiza [ more ] [ reply ] [ GLSA 200506-21 ] Trac: File upload vulnerability 2005-06-22 Sune Kloppenborg Jeppesen (jaervosz gentoo org) |
|
Privacy Statement |
<b>effects:</b>
all versions of php nuke
<b>solution:</b>
better filtering of offsite avatar selection.
in the avatar selection of the profile, u have the option of linking to an offsite image. this is the perfect place for an exploit.
by placing this line of
[ more ] [ reply ]